COMP 527 Final Project Proposal Wei-Cheng Xiao and Lei Tang

advertisement
COMP 527 Final Project Proposal
Wei-Cheng Xiao and Lei Tang
Abstract—The packets in a mobile wireless ad-hoc network
(MANET) are vulnerable to various packet-dropping attacks.
Due to the lack of a centralized monitoring mechanism, it is
a challenging problem to identify the attackers that launch the
packet-dropping attacks in MANET. The existing DoS defensive
techniques have not provided a scheme to efficiently and effectively solve this challenging problem. Hence we present a scheme,
called CATCH, which constructs cryptographically-verifiable
proofs for packet transmissions and identify the attackers by
systematically investigating the packet transmission proofs from
the nodes on a route. CATCH is a distributed scheme and a
node maintains the packet-dropping metric for every node to
which it has forwarded packets. The packet-dropping metric
is computed based on the past packet forwarding history and
provides an important information for a node to evaluate the
reliability of a node in forwarding packets. We plan to evaluate
CATCH by measuring its accuracy and latency of identifying
malicious packet droppers in simulated wireless ad-hoc networks
using ns-2 network simulator.
I. I NTRODUCTION
Wireless ad-hoc networks (MANETs) have many applications, such as providing communication among a disaster relief
team deployed to a place without a network infrastructure. In a
MANET, a packet may traverse multiple hops until reaching its
destination, making it vulnerable to various packet-dropping
attacks. The packet droppers can censor the packets forwarded
to them and drop the packets based on the packet content, or
selectively drop the packets [1] based on the source and the
destination of the packets.
Due to the lack of a centralized packet transmission monitoring mechanism and a reliable network infrastructure to
support global monitoring, it is a challenging problem to
identify malicious packet droppers. For instance, a malicious
packet dropper may claim that it has transmitted all packets
forwarded to it while its downstream node receives none of
these packets. A malicious packet dropper may also drop
the acknowledgment packet for a packet received by the
destination, causing the source to resend the packet. It is
difficult for the source to identify which node on the route
to the destination is a malicious dropper as every one of them
can be a malicious node. Furthermore, wireless transmissions
may fail due to the node mobility and poor channel condition,
which adds to the difficulty of identifying the malicious nodes.
The existing DoS defensive techniques have not provided
a scheme that can efficiently and effectively solve this challenging problem. The gray hole detection scheme in [1] relies
on the cooperative nodes and probe packets to check whether
a node is launching packet dropping attacks. The probe
packets incur extra overhead and the results from cooperative
nodes may not be trustworthy. The scheme in [2] utilizes the
acknowledgment packets to detect the packet droppers under
the assumption that the malicious packet droppers will not
drop acknowledgment packets. A malicious node in wireless
network may drop all types of packets, rendering this scheme
less effective in real networks.
We present a scheme, called CATCH, which constructs
cryptographically-verifiable proofs for packet transmissions
and identify the packet-dropping attackers by systematically
investigating the packet transmission proofs from the nodes on
a route. CATCH requires a node to provide a proof for every
packet it forwarded. CATCH is a distributed scheme and a
node maintains the packet-dropping metric for every node to
which it has forwarded packets. The packet-dropping metric
is computed based on the past packet forwarding history and
provides an important information for a node to evaluate the
reliability of a node in forwarding packets. As it is impossible
to tell the difference between a malicious packet forwarder
dropping a packet or the packet being lost due to wireless
transmission errors, a node can also be regarded as having
a high packet-dropping metric by other nodes if it has bad
wireless connections to other nodes.
CATCH provides a very useful information for MANET
applications. The wireless transmission will have a higher
delivery ratio by precluding the nodes with high packetdropping metrics. With the knowledge of the packet-dropping
metric of the nodes in the network, a routing protocol will
be able to design better routes to avoid packet droppers. A
malicious packet dropper will cause much less damages to the
network communications after it is identified by other nodes
as having a high packet-dropping metric.
We plan to evaluate CATCH by measuring its accuracy and
latency of identifying malicious packet droppers in simulated
wireless ad-hoc networks using ns-2 network simulator.
II. R ELATED W ORK
This section we review the existing work on detecting and
defending the packet dropping attacks.
The scheme in [1] relies on probe packets and the cooperative nodes to detect whether a node is launching gray hole
attack by selectively dropping packets. If the packet initiator
finds that a packet sent to a cooperative node is not received
by the cooperative node, the packet initiator increases the
suspicion value of the node checked. The first problem of
this scheme is that the cooperative nodes may be malicious
and send bogus probe packet reception information to the
packet initiator. Another problem is that sending probe packets
consumes wireless network bandwidth and the packet dropper
may forward the probe packets while selectively dropping the
data packets from the initiator.
The scheme in [2] utilizes the acknowledgment packets
to detect the packet droppers under the assumption that the
malicious packet droppers will not drop acknowledgment
packets. A malicious node in wireless network may drop all
types of packets, rendering this scheme less effective in real
networks. In addition, this scheme forms different groups on
a route and the ACK packets transmitted among the groups
incurs extra messaging overhead.
The REAct system [3] tries to identify individual malicious
nodes who conduct packet drop attacks. In REAct, when a
significant packet drop ratio is detected, packet drop ratio, the
source node would cast a random audit request to ask for
a behavioral proof of successful packet reception. Through
this mechanism, malicious nodes are identified by the proofs
provided by honest nodes. However, it assumes that there exist
at least two independent paths between any pair of nodes in
the network, and that a source node shares pairwise secret
keys with the nodes in the source-destination node path. These
assumptions would introduce high overhead when the network
size gets large and not feasible in real network. In addition,
REAct cannot detect colluding attackers while our detection
system works no matter the attackers are colluding or not.
III. M ETHODOLOGY
In our proposed scheme, detection of packet dropping is
performed by the source node of each active route in the
network. An active route is a path in use by a sourcedestination pair. For every node in the path, on receiving
a packet, the node would send back an ACK (MAC layer)
back to the previous hop. This ACK includes the node’s
signature so that the ACK is considered to be unforgeable.
The previous hop keeps this ACK as a proof of its successful
packet forwarding and saves it for later investigation from the
source node, if the source node fails to receive an ACK for
the data packet sent to the destination. Once the destination
node receives a packet, it would send an ACK for the data
packet to the source node via the reverse route. This ACK is
also digitally signed by the destination and cannot be forged.
Every node in the path receiving this ACK would also keep
it as a proof. If the source does not receive the ACK in a
given amount of time, it considers a packet/ACK loss event has
occurred. If packet loss events happen too often, i.e., higher
than a threshold, an investigation would be held by the source
node to find out where the packets are lost/dropped. Later in
this section, we will describe details of the investigation. Here
we make the following assumptions in our work:
•
•
In the network, packet transmission and forwarding is
based on source routing. We will be using DSR as the
routing protocol in this work; however, any source routing
protocol would be compatible to our scheme.
We assume all links in the network are symmetric; that
is, node A can hear node B implies node B can hear node
A.
A. Investigation
Based on the number of data packets generated and the
number of ACKs it receives, a source node can detect whether
the packet loss rate is higher than a threshold. If so, it would
hold an investigation to find out where the packets are dropped
or lost, and then the nodes near the drop point would be
regarded as bad or malicious nodes. In the investigation, the
source node asks every node in the path to provide evidences
of the reception of ACKs both from their previous hops and
the destination. Based on these evidences, the source node can
narrow down the scope of suspects to two nodes. For instance,
node S sends packets to the destination node D, and these
packets are forwarded by A, B, and C in order. If a packet
is lost and A provides the proof of receiving an ACK (MAC
layer) from B but B cannot provide any proof, then S would
consider that the packet is lost/dropped between B and C. With
the same logic, if an ACK (Transport layer) is dropped, S can
also find out the suspects.
B. The packet-dropping metric
In addition to the investigation scheme, a packet-dropping
metric helps a source node to make judgment of nodes’
“goodness” more accurately and fairly. A source node builds
the metrics of the nodes in its paths. Whenever a node is
considered to have lost or dropped a packet or ACK, its packetdropping metric would be incremented. On the other hand, on
successful packet/ACK transmission, all the nodes in the path
would get their metrics decrease. A node with high packetdropping metric would be considered as a malicious node or
bad node, i.e., a node running out of power or getting high
interference nearby. If possible, a source node would not select
a node with high metric when deciding the route. We do not
give the details of packet-dropping metric management here
but the concept only. Details will be described in the final
report. Note that a node only keeps the metrics of other nodes
internally; that is, no metric information is shared among
different nodes.
C. System Environment and Performance Evaluation
We will be implementing our work and evaluate the performance in the network simulator ns-2, which provides us the
DSR routing protocol and it simplifies our work. Even though,
we have to add the packet-dropping metric information as well
as notification mechanism on missing packets or ACKs into
DSR for route selection. We will be using different kinds of
mobility model in ns-2 to test how our system performs under
node mobility. We will also evaluate the overall performance
from different aspects, including the overhead of notification
messages and the false positive rate and false negative rate of
malicious node detection.
IV. E XPECTED C ONTRIBUTION
Our work pursues to narrow down the scope of possible
malicious nodes in malicious node detection and get high
successful detection rates when multiple active routes exist in
the network at the same time. We will also leverage the packetdropping metrics to track historical behavior of the nodes
and hopefully get more accurate results. Through performance
evaluation, we are going to demonstrate that our system can
detect malicious or bad nodes in MANET with reasonable
overhead and good accuracy, in terms of false positive rates
and false negative rates. Furthermore, our detection mechanism can help source nodes in MANET choose better routes
by avoiding malicious nodes or nodes with low power or bad
link quality or communication environments.
V. E XPECTED P ROJECT S CHEDULE
Expected progress
Come up with all the details of our system
design and write them down in the report
Nov. 5 Finish the implementation of our system in
ns-2
Nov. 9 Finish simple tests and debugging in our
implementation
Nov. 16 Finish performance evaluation of our system
under specific mobility model and parameters
Nov. 26 Try different parameters and mobility models
and finish more performance analysis
Nov. 29 Finish the final report and preparation for
presentation
Date
Oct. 26
R EFERENCES
[1] J. Sen, M. G. Chandra, H. S.G., H. Reddy, and P. Balamuralidhar, “A
mechanism for detection of gray hole attack in mobile ad hoc networks,”
in Proceedings of 6th International Conference on Information, Communications and Signal Processing 2007, Dec. 2007.
[2] A. S. A. Ukey and M. Chawla, “Detection of packet dropping attack using
improved acknowledgement based scheme in manet,” IJCSI International
Journal of Computer Science Issues, vol. 7, no. 1, pp. 12–17, 2010.
[3] W. Kozma and L. Lazos, “REAct: resource-efficient accountability for
nodemisbehavior in ad hoc networks based on random audits,” in Proceedings of the second ACM conference on Wireless network security.
ACM, 2009, pp. 103–110.
Download